STE WILLIAMS

S for Security is Google owner Alphabet’s new favorite letter

Google’s parent company Alphabet has launched a security company named Chronicle.

The business will be the new home of VirusTotal, which Google acquired in 2012. Chronicle’s other story will be “a new cybersecurity intelligence and analytics platform that we hope can help enterprises better manage and understand their own security-related data.”

Chronicle’s schtick is that security teams drown in multitudes of alerts, but can’t see the significant stuff and therefore can’t spot threats or attacks for ages. The company therefore plans to throw the cloud and machine at the problem, giving users more storage than they can run on-premises and algorithmic assistance to mine all that data to figure out what bad actors are up to.

Chronicle’s not said much about how it will deliver, other than to say it plans to use “Massive compute and storage” to and to deliver its promised insights as cloud services.

The company has also hopped on the “there are too many security vendors” bandwagon, arguing that “The proliferation of data from the dozens of security products that a typical large organization deploys is paradoxically making it harder, not easier, for teams to detect and investigate threats. Chronicle’s not alone with that stance: VMware’s voiced similar sentiments and security experts of The Register’s acquaintance have often said that security vendors selling solutions that address particular problems end up creating overlapping arrays of worthy tools that together make life more complicated.

Whether Chronicle will itself help or hinder remains obscure, as does the exact nature of its service remains . The company has revealed it’s running private Alpha tests, but precious little other detail is available at the time of writing.

One thing that is sure is that the security market is expected to grow, and grow, and grow, as increased interconnectivity gives bad actors more opportunities – and vendors who think they have something to offer reason to launch new products or services. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/25/alphabet_starts_secutity_business_named_chronicle/

IT ‘heroes’ saved Maersk from NotPetya with ten-day reinstallation bliz

It’s long been known that shipping giant Maersk suffered very badly from 2017’s NotPetya attack.

Now the company’s chair has detailed just how many systems went down: basically all of them.

Speaking on a panel at the World Economic Forum, Møller-Maersk chair Jim Hagemann Snabe detailed the awful toll of the attack as necessitating the reinstall “4,000 new servers, 45,000 new PCs, and 2,500 applications”. Or as Snabed described it: “a complete infrastructure.”

“And that was done in a heroic effort over ten days,” he said.

“Normally – I come from the IT industry – you would say that would take six months. I can only thank the employees and partners we had doing that.”

Speaking from about 3:00 in the video below, Snabe said he first got word of the attack in a 4:00 AM phone call.

Youtube Video

He noted that Maersk was “probably collateral damage” in an attack designed by and for a state (the Ukraine was the target: the malware was put in a malicious update to MeDoc, the country’s most popular accounting software).

To recover from the attack, Snabe said the company had to revert to manual systems for the ten-day reinstall.

Given that a Maersk ship docks somewhere in the world every 15 minutes, unloading between 10,000 to 20,000 containers, it’s surprising that Snabe claims the staff managed to revert to manual systems with only “a 20 per cent drop in volumes”.

The chair said people across the organisation just did the work to keep disruptions to a minimum, labeling their efforts “human resilience”.

But he also warned that in the near future, as automation creates near-total reliance on digital systems, human effort won’t be able to help such crises.

Noting that the internet was not designed to support the applications that now rely on it, he said “There is a need for a radical improvement of infrastructure.” He called for “collaboration between companies, technology companies [and] law enforcement” to re-design the digital world.

That effort is a way off. For now Snabe plans to ensure Maersk learns from the “very significant wake-up call” that was the attack and turn its experience into a security stance that represents competitive advantage.

He also called for all businesses to stop being naïve about security, saying organisations of any size – even the mightiest – will experience disruptions if they don’t take security seriously.

Maersk’s own experience is that the attack it endured cost it between $250m and $300m, in line with what the company told a conference call in August 2017.

Maersk wasn’t the only outfit to cop a huge NotPetya bill: pharma giant Merck was also bitten to the tune of $310m, FedEx a similar amount, while WPP and TNT were also hit but didn’t detail their costs. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/25/after_notpetya_maersk_replaced_everything/

SHL just got real-mode: US lawmakers demand answers on Meltdown, Spectre handling from Intel, Microsoft and pals

Four Republican members of the US House of Representatives sent letters on Wednesday to the leaders of Amazon, AMD, Apple, ARM, Google, Intel and Microsoft seeking answers about how the embargo on the Meltdown and Spectre bugs was handled.

The secrecy agreement, put in place by these same companies, demanded silence from June 2017, when researchers recognized the seriousness of the processor design flaws, through the planned date of coordinated disclosure on Tuesday, January 9, 2018.

However, unaware of any embargo and after some detective work, The Register broke the news a week early, on January 2, 2018. Google then posted technical details about the flaws on January 3, with Arm following suit with a white paper and mitigation code, and AMD pitching in information.

Chaos ensued as Intel rushed out patches – some of which proved faulty – and tried to reassure customers and stockholders that they would not have to replace most of the CPUs shipped in the past two decades. Meanwhile, operating systems from Windows to macOS to the various Linux distros emitted a range of fixes and mitigations for Meltdown and Spectre over the course of several days.

The dust still hasn’t settled. On Sunday, Linux kernel leader Linus Torvalds fumed that Intel’s approach to mitigating the Spectre flaw is “pure garbage.”

Questions

The four congressional representatives – Greg Walden (R-OR), Gregg Harper (R-MS), Bob Latta (R-OH), and Marsha Blackburn (R-TN) – affiliated with the House Energy and Commerce Committee and various subcommittees, have asked Amazon’s Jeff Bezos, Arm’s Simon Segars, Apple’s Tim Cook, AMD’s Lisa Su, Google’s Sundar Pichai, Intel’s Brian Krzanich, and Microsoft’s Satya Nadella the same questions about how the embargo and disclosure were handled.

The breakdown of the embargo, they note, raises questions about whether it was effective and appropriate, given how companies left out of the agreement were caught off-guard.

“While we acknowledge that critical vulnerabilities such as these create challenging tradeoffs between disclosure and secrecy, as premature disclosure may give malicious actors time to exploit the vulnerabilities before mitigations are developed and deployed, we believe that this situation has shown the need for additional scrutiny regarding multi-party coordinated vulnerability disclosures,” the legislators say in their letters, dated Wednesday.

Cybersecurity, they insist, has become a collective responsibility that extends beyond the information technology community to include energy, healthcare, manufacturing, and other sectors.

“This reality raises serious questions about not just the embargo imposed on information regarding the Meltdown and Spectre vulnerabilities, but on embargos regarding cybersecurity vulnerabilities in general,” the letters conclude.

Intel, which is already facing several lawsuits over the vulnerabilities and reports its Q4 2017 earnings tomorrow, is apparently thrilled.

“The security of our customers and their data is critical to us,” a spokesperson told The Register via email. “We appreciate the questions from the Energy and Commerce Committee and welcome the opportunity to continue our dialogue with Congress on these important issues. In addition to our recent meetings with legislative staff members, we have been discussing with the Committee an in-person briefing, and we look forward to that meeting.”

Meanwhile, Google meanwhile insists it behaved in accordance with established practices. “After working with security teams across the industry for months, we released our findings according to established principles of vulnerability disclosure, and deployed mitigations to help secure people’s information on Google and other platforms,” a spokesperson told The Register via email.

Lawmakers are seeking similar answers from the US government itself, which has been criticized for opaque and inconsistent handling of vulnerabilities. The House of Representatives earlier this month approved the “Cyber Vulnerability Disclosure Reporting Act,” to ensure that the Department of Homeland Security tells elected officials about its policies and procedures for bug reporting. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/25/house_reps_intel_meltdown_spectre/

Mobile point of sale gets a PCI security standard

The advent of mobile point-of-sale (MPOS) systems has been a boon for consumers and retailers of modest means, but the Payment Card Industry Security Standards Council’s security wonks worried that they can’t adhere to the strict hardware standards that merchants’ credit card merchant terminals.

Hence the announcement [PDF] of a new standard that aims to advise merchants on how they can let you pay with a PIN on a mobile device without letting crims steal creds.

The standard’s four key principles are that a service has to be actively monitored, in case a device like a phone or tablet is compromised; the PIN has to be isolated from other account data; ensuring the “software and integrity of the PIN entry application” on common off-the-shelf (COTS) devices; and protecting both PIN and account data “using a PCI approved Secure Card Reader-PIN (SCRP).”

As the PCI SSC’s Troy Leach explains in this blog post, the aim is to “mitigate risks associated with a software-centric solution”.

The all-important isolation of account data from the PIN, Leach said, “happens as the Primary Account Number (PAN) is never entered on the mobile device with the PIN. Instead that information is captured by an EMV Chip reader that is approved as a Secure Card Reader for PIN (SCRP) that encrypts the contact or contactless transaction.”

Back-end security controls include “attestation (to ensure the security mechanisms are intact and operational), detection (to notify when anomalies are present) and response (controls to alert and take action) to address anomalies,” Leach said.

As well as security requirements, which apply to companies providing the payment solutions, the standard includes a test requirements document. Leach said the test requirements, which will be published in February, “create validation mechanisms for payment security laboratories to evaluate the security of a solution”.

As devices pass the Council’s testing, they’ll be listed on its Web site. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/25/mobile_pos_gets_pci_security_standard/

libcurl has had auth leak bug since ‘the first commit we recorded’

If you use libcurl, the command line tool and library for transferring data with URLs, get ready to patch. The tool has a pair of problems, one of which is an authentication leak.

This advisory says the library can leak authentication data to third parties because of how it handles custom headers in HTTP requests.

“When asked to send custom headers in its HTTP requests, libcurl will send that set of headers first to the host in the initial URL but also, if asked to follow redirects and a 30X HTTP response code is returned, to the host mentioned in URL in the `Location:` response header value”, the advisory states.

Applications that pass on custom authorisation headers could therefore leak credentials or “data that could allow others to impersonate the libcurl-using client’s request”.

CVE-2018-1000007 has been present since “before curl 6.0”, the advisory states – meaning it goes back to before September 1999: Indeed, the advisory ‘fesses up that “It existed in the first commit we have recorded in the project”.

Users need to upgrade to curl 7.58.0, and there’s a warning of a change of behaviour to close the bug. If you need to pass a header to other hosts, curl needs a specific permission to do so, using a --location-trusted flag.

The second issue, CVE-2018-1000005, is described as an “HTTP/2 trailer out-of-bounds read”. The advisory says “reading an HTTP/2 trailer could mess up future trailers since the stored size was one byte less than required.”

“When accessed, the data is read out of bounds and causes either a crash or that the (too large) data gets passed to the libcurl callback. This might lead to a denial-of-service situation or an information disclosure if someone has a service that echoes back or uses the trailers for something.”

The second bug only exists in libcurl versions between 7.49.0 to 7.57.0. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/25/curl_carried_auth_leak_bug_practically_forever/

Skype, Slack, other apps inherit Electron vuln

Updated If you’ve built a Windows application on Electron, check to see if it’s subject to a just-announced remote code execution vulnerability.

Electron is a node.js and Chromium framework that lets developers use Web technologies (JavaScript, HTML and CSS) to build desktop apps. It’s widely-used: Skype, Slack, Signal, a Basecamp implementation and a desktop WordPress app all count themselves as adopters.

Slack users should update to version 3.0.3 or better, and the latest version of Skype for Windows is protected, Microsoft told Cyberscoop.

Electron has only published limited details of CVE-2018-1000006, but it affects Windows applications that use custom protocol handlers in the framework.

Here’s what the advisory has to say:

“Electron apps designed to run on Windows that register themselves as the default handler for a protocol, like myapp://, are vulnerable.

“Such apps can be affected regardless of how the protocol is registered, e.g. using native code, the Windows registry, or Electron’s app.setAsDefaultProtocolClient API.

A ray of sunshine to close: “macOS and Linux are not vulnerable to this issue”, Electron’s developers said.

The advisory doesn’t give any indication how many apps make themselves the default protocol handler.

Electron has pushed out two patched versions: 1.8.2-beta.4, 1.7.11, and 1.6.16, and: “If for some reason you are unable to upgrade your Electron version, you can append — as the last argument when calling app.setAsDefaultProtocolClient, which prevents Chromium from parsing further options.” ®

Update: Signal has posted to Skype that it’s not affected.

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/24/skype_signal_slack_nherit_electron_vuln/

Bell Canada Canucks it up again: Second hack in just eight months

Executives at Bell Canada have been left with faces redder than their nation’s flag – after their subscriber database was hacked for the second time in eight months.

In May 2017, 1.9 million customer records were stolen from Canada’s largest telco after its anti-hacking defenses failed. Now the biz has admitted miscreants have struck again and made off with the personal information of 100,000 punters.

“We apologize to our customers and are contacting all those affected,” spokesman Mark Langton told the Globe and Mail. “There is an active Royal Canadian Mounted Police investigation of the incident and Bell has notified appropriate government agencies including the Office of the Privacy Commissioner.”

Langton said the attackers got away with the names and email addresses of subscribers, along with some phone numbers, and account user names and numbers. It does not appear, at this point, that credit card data was nicked, but investigations are continuing.

“We are following up with Bell to obtain information regarding what took place and what they are doing to mitigate the situation, and to determine follow up actions,” said the Office of the Privacy Commissioner’s spokeswoman Tobi Cohen.

Given Bell’s preeminent position in Canada, and the fact that it’s pulling in over CAN$5bn a quarter, you’d think that that some money could be invested in security. It seems not. ®

Sponsored:
Minds Mastering Machines – Call for papers now open

Article source: http://go.theregister.com/feed/www.theregister.co.uk/2018/01/24/bell_canada_security_hack/

Meet Chronicle: Alphabet’s New Cybersecurity Business

Google parent company Alphabet introduces Chronicle, which will combine a security analytics platform and VirusTotal.

Alphabet, parent company of Google, Nest, and other ventures, today announced a new independent business focused on cybersecurity. Chronicle is the latest project to graduate from X, the internal research lab where Alphabet develops new technologies.

Chronicle was built to help security and IT professionals detect and prevent cyberattacks before they cause damage. The businesses will be split in two parts: an intelligence and analytics platform to handle security-related data, and VirusTotal, which Google acquired in 2012.

Part of the intent behind Chronicle is to help businesses deal with an increase of data amid the security talent shortage, writes Chronicle cofounder and CEO Stephen Gillett in a blog post.

“At large companies, it’s not uncommon for IT systems to generate tens of thousands of security alerts a day,” he explains. “Security teams can usually filter these down to about a few thousand they think are worth investigating — but in a day’s work, they’re lucky if they can review a few hundred of them.”

The result is thousands of potential clues about hacking are either overlooked or thrown away. Further, many businesses don’t have the budget to store all relevant data amid increasing storage costs, impeding security investigations.

Chronicle is building its analytics platform, which is currently undergoing testing at Fortune 500 companies, to detect and analyze security signals that are otherwise too hard and expensive to find. The platform will leverage machine learning to dig through enterprise data, detect threats, and look for patterns to find areas of likely vulnerability.

VirusTotal, the second component, is a malware intelligence service that analyzes suspicious files and URLs to detect viruses, Trojans, worms, and other forms of malware. Alphabet integrated VirusTotal into X in 2015 and reports it will continue to operate as it has been.

Chronicle was officially founded as an X project in February 2016 and spent two years in development. Alphabet has recruited enterprise security experts from across the industry to work on Chronicle. In addition to Gillett, who was formerly COO at Symantec, the team includes Norton antivirus co-founder Carey Nachenberg and Google engineering vet Will Robinson.

The launch of Chronicle outside the scope of typical projects at X, also known as “the moonshot factory.” Previously explored ideas include smart contact lenses, Internet-beaming balloons, and self-driving cars. Very few have advanced to the graduation phase of Alphabet’s projects.

Related Content:

Kelly Sheridan is Associate Editor at Dark Reading. She started her career in business tech journalism at Insurance Technology and most recently reported for InformationWeek, where she covered Microsoft and business IT. Sheridan earned her BA at Villanova University. View Full Bio

Article source: https://www.darkreading.com/cloud/meet-chronicle-alphabets-new-cybersecurity-business/d/d-id/1330897?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

PCI DSS Adds Standard for Software-based PIN Entry

Software-Based PIN Entry on COTS (SPoC) standard supports EMV contact and contactless transactions with PIN entry on merchant mobile devices.

The PCI Security Standards Council has created a new standard for software-based PIN entry for transactions on merchant smartphone and tablets and other off-the-shelf commercial devices.

PCI Software-Based PIN Entry on COTS (SPoC) provides security specifications for secure PIN entry apps that then are used with a secure card reader for PINs on mobile point-of-sale systems, which have become all the rage for small merchants.

Mobile PoS “has enabled them to take orders and accept payments on a tablet or smartphone, anytime and anywhere. However, some small merchants in markets that require EMV chip-and-PIN acceptance may have found the costs of investing in hardware prohibitive,” said Ron van Wezel, senior analyst with Aite Group. The new PCI standard incorporates PIN entry into the mobile touchscreen: “This means that merchants can accept payments with just their mobile device and a small, cost-efficient card reader connected to it along with a secure PIN entry application,” he said.

Troy Leach, PCI SSC Chief Technology Officer, said the new standard provides app developers and mobile and other platform vendors with security requirements for creating secure PIN technology for those devices. 

Read more about the new PCI standard here

Dark Reading’s Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Article source: https://www.darkreading.com/risk/pci-dss-adds-standard-for-software-based-pin-entry/d/d-id/1330898?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

DDoS Attacks Become More Complex and Costly

Major DDoS attacks cost some organizations more than $100,000 in 2017, according to a new NETSCOUT Arbor report.

Distributed denial-of-service (DDoS) attacks are more complex and cause more financial damage than ever, new data shows.

According to NETSCOUT Arbor’s 2017 Worldwide Infrastructure Security Report published today, the number of DDoS attacks that cost organization between $501 to $1,000 per minute in downtime increased by 60%. In addition, 10% of enterprises estimated a major DDoS attack cost them greater than $100,000 in 2017, five times more than previously seen.

Now in its 13th year, the report is based on 390 responses from service providers, hosting, mobile, enterprise, and other types of network operators from around the world. A full 66% of all respondents identify as security, network, or operations professionals.

Gary Sockrider, principal security technologist with NETSCOUT Arbor, says there was a 20% increase in multi-vector attacks in 2017 compared to the previous year. Multi-vector attacks combine high-volume floods, TCP state exhaustion attacks, and application-layer attacks in a single sustained offensive, which makes the attacks more difficult to mitigate and increases the attackers chance of success.

“We found that nearly half the group said they experienced a multi-vector attack,” Sockrider says.

“Along with revenue loss, companies also experience customer and employee churn as well as reputational damage,” he says.

DDoS attacks last year originated primarily from China, Russia, and inside the US, according to the report. The top motivators for the attacks were online gaming-related (50.5%), criminals demonstrating DDoS capabilities to potential customers (49.1%), and criminal extortion attempts (44.4%). Political/ideological disputes were fifth on the list at 34.5%.

Sockrider says due to the global shortage of IT security talent, many respondents were turning to automation  for DDoS mitigation: 36% of service providers use automation tools for DDoS mitigation, and 30% of providers employ on-premise or always-on cloud services for thwarting these attacks.

Meantime, researchers at Imperva researchers developed a list of the Top 12 DDoS Attack Types You Need to Know. Among them:

DNS Amplification: In a reflection type of attack, a perpetrator starts with small queries that use the spoofed IP address of the intended victim. Exploiting vulnerabilities on publicly-accessible DNS servers, the responses inflate into much larger UDP packet payloads and overwhelm the targeted servers.

UDP Flood: The perpetrator uses UDP datagram–containing IP packets to deluge random ports on a target network. The victimized system attempts to match each datagram with an application, but fails. The system soon becomes overwhelmed as it tries to handle the UDP packet reply volume.

DNS Flood: Similar to a UDP flood, this attack involves perpetrators using mass amounts of UDP packets to exhaust server-side resources. However, in this attack the target is DNS servers and their cache mechanisms, with the goal being to prevent the redirection of legitimate incoming requests to DNS zone resources.

Related Content:

 

Steve Zurier has more than 30 years of journalism and publishing experience, most of the last 24 of which were spent covering networking and security technology. Steve is based in Columbia, Md. View Full Bio

Article source: https://www.darkreading.com/attacks-breaches/ddos-attacks-become-more-complex-and-costly/d/d-id/1330899?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple